StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Use of BOTNET in Server Service Attacks - Essay Example

Cite this document
Summary
An author of this essay seeks to evaluate the threat of so-called BOTNETs - the networks that are controlled by hackers to attack a specific target. The essay will shed light on the process aspects and particular types of attacks performed using BOTNET…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Use of BOTNET in Server Service Attacks
Read Text Preview

Extract of sample "Use of BOTNET in Server Service Attacks"

Full Paper BOTNETS Robot network or BOT NET is also known as a ‘Zombie army’ and is considered as a group of computers that are compromised and controlled by the hacker to attack a specific target (Botnet.2011). Likewise, these group of compromised computers will broadcast spam, relay unwanted emails, viruses or excessive request against any service associated with a specific network or server. The compromised zombie army is invaded by a Trojan, which is known as a remote application that installs itself within the system memory or kernel and provides data or connectivity to the hacker.

Moreover, Trojan is operational by initiating an Internet Relay Chat (IRC) that waits for any action from the hacker who has full control over the botnet (Rapoza, 2008). Apart from IRC, hackers utilize rootkits to compromise weak system with no updated security patches and have security loop holes that facilitate hacker’s objectives. As there are countless computers connected to the Internet, they use tools to capture and identify vulnerable systems and uses IP spoofing for (Spoofing.2011) manipulating the original IP addresses for gaining access in to the system.

Furthermore, these compromised systems are from different geographical locations, it is difficult to identity suspicious traffic, as it represents different time zones. As botnets are considered as a major player in a Denial of Service attacks, it can be prevented by honey pots and bastion hosts that will identify suspicious broadcast at the initial level. As mentioned previously, that a zombie army initiates flooding and broadcasting attacks from various locations to the specific target. The characteristic of this attack encompasses threats from distributed source and is known as distributed denial of service attacks (DDoS).

Computer network encyclopedia describes it, as the incorporation of hundreds or even thousands of computers that were previously compromised used for transmitting huge volume of unwanted traffic to the target. DDoS attacks are considered to be lethal in the world of Internet has imposes significant risks for businesses, governmental organizations, army networks etc. (Ghazali & Hassan, 2011) research on DDoS attacks has revealed vulnerabilities not only in the network architecture or infrastructure, but also in the protocol specifications along with Internet.

Exhibit 1.1 demonstrates types of flooding DDoS attacks along with protocols: Attack Name UDP Flood TCP Flood LorDAS Shrew Induced-Shrew Quiet Attack Rate High High Low Low Low Low Attack Traffic UDP Flow TCP Flow No information TCP Flow Optimistic ACK packets Short-lived, TCP flows Attack Target UDP or TCP clients UDP or TCP clients Application servers Routers in TCP Flow Internet Access, Routers Routers in TCP Flows Attack Goal Exhaust resources at target machines Consume Bandwidth Reduce availability and capability of servers Deny bandwidth TCP Flows, close session Dos at Internet access routers Reduce throughput Exhibit 1.

1 Source: (Ghazali & Hassan, 2011) High rate flood attacks: This type of attack is achieved by traffic generation from many machines that may be in total of hundreds or thousands dispersed globally. The flooding of unwanted traffic degrades the performance of the target system or network by utilizing all the resources (Ghazali & Hassan, 2011). Low rate flood attacks: This type of attack is not similar to a high rate flood attack, as the attacker broadcast intelligently constructed packets. These packets are designed to bypass traditional flood detectors by varying the traffic rate (Ghazali & Hassan, 2011).

Low Rate DoS Attack against Application Servers (LoRDAS): This type of attack targets iterative servers and augments its capacity against synchronized or iterative servers. Likewise, the LoRDAS attack utilizes the capacity of these servers by sending a broadcast intelligently so that the servers begin to process the request of the hacker and overloading the server to fulfill any new legitimate request (Ghazali & Hassan, 2011). Shrew attack: This type of attack silently denies the bandwidth of a TCP data steam.

Likewise, a short broadcast of large volume of traffic is generated for a limited time. This short burst artifice the TCP that the data stream is congestion and buffer of the targeted router overflows that result in packet drops (Ghazali & Hassan, 2011). Induced-shrew attack: this attack dominates a remote host that is called as a slave and the controller of this system or slave is called as a master. Likewise, the slave is responsible for attacking low rate broadcasts and must be incorporated with TCP i.e. any application or network service operating on the Internet or associated with file transfer service (Ghazali & Hassan, 2011).

References Botnet.(2011). Computer Desktop Encyclopedia, , 1. Denial of service attack.(2011). Computer Desktop Encyclopedia, , 1. Ghazali, K. W. M., & Hassan, R. (2011). Flooding distributed denial of service attacks-A review. Journal of Computer Science, 7(8), 1218-1223. Rapoza, J. (2008). Botnets vs. botnets Ziff Davis Enterprise. Spoofing.(2011). Computer Desktop Encyclopedia, , 1.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Botnets Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Botnets Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1443739-botnet-paper
(Botnets Essay Example | Topics and Well Written Essays - 750 Words)
Botnets Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1443739-botnet-paper.
“Botnets Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1443739-botnet-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Use of BOTNET in Server Service Attacks

IS Security and the Operating Systems

Therefore, it is easy for an attacker to use the application file or vulnerability to attack the operating system either through one application or by infecting other applications.... Security in both operating systems and applications is extremely crucial due to the increased threat of outside or inside attack....
6 Pages (1500 words) Essay

The Concept of a Browser Security

Security Science Name Instructor course Date Question 1 In most cases, the Botnets are majorly in application for the Distributed Denial-of-Services attacks.... These are attacks that target the computer system, alternatively, a network system that result in loss of service by the users.... The best approach is to conduct a recovery and prevent any possible attacks in future.... hellip; The loss of service is through the lack of connectivity or termination of the network system via the consumption of bandwidth within the network in that the system gets overloaded....
5 Pages (1250 words) Assignment

Forensics Based On Evidence Gathered With Peep Attacks

The majority of the literature describing Botnet attacks is focused on a varied level of IRC-based malware, the activity of Spam mail and the structure of Distributed Denial of Service (DDOS).... Because new attacks originating from a Botnet are difficult to identify by default fingerprinting.... Firewalls cannot readily be configured to react to a Botnet attack by using information obtained from previous attacks.... The Peep attack is a variant application of a botnet....
15 Pages (3750 words) Essay

Discuss some of the treats that Cyberterrorism pose. How can cyberattacks be prevented

They utilize the internet to share novel methods to employ in their future attacks and other important information.... This technology has been evolving continuously and computers have become ubiquitous.... The proliferation of the Internet has engendered a much greater… It is impossible to envision day to day life, in the absence of computers....
11 Pages (2750 words) Essay

Definition, Organisation, and Creation of Botnets

This increased power of botnets has led to major DoS (Denial of Service) attacks towards servers.... The most common attacks that are deployed include ICMP (Internet-Control-Message-Protocol), UDP and TCP SYN floods.... These attacks can also be in the form of password “brute-forcing” and application layer attacks.... hese attacks can are carried out at in networks with speeds as high as multigigabit per second....
7 Pages (1750 words) Case Study

Analysis of Hacking Attacks

The paper "Analysis of Hacking attacks" states that Stuxnet has been proved to be able to control communication between PLC and Siemens programming station.... It hides changes made to PLC and it is rated as one of the most sophisticated engineered worms.... hellip; Stuxnet worm is one type that is believed to have been developed by the government for its development is considered to be a very complex and sophisticated one to be developed just by a private group (Holliday, 2010)....
24 Pages (6000 words) Coursework

Types of Hacking

The paper "Types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions.... The term “hacker” is presently too broad to represent the specifics of the different sorts of computer-related attacks.... In order to incorporate all of the different computer attacks in a way that facilitates understanding it will be necessary to identify specific sub-categories that will fall under the umbrella of “hackers” (Howard, 1997)....
24 Pages (6000 words) Coursework

What Are Bonnets and How They Work

Over the recent past, due to the growth in technologies, expanding use, and lack of common control, the Internet has become prone to attacks.... These attacks include click fraud, keylogging, spamming shipping, and distributed denial of services and they are carried out using botnet (Banday, Qadri & Shah 2009, p....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us